Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-43497

Опубликовано: 20 сент. 2023
Источник: redhat
CVSS3: 3.6

Описание

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

A flaw was found in Jenkins weekly and LTS due to an issue when processing file uploads using the Stapler web framework. By sending a specially crafted request, a local authenticated attacker could bypass security restrictions and access the Jenkins controller file system to read and write the files before they are used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServicesjenkinsAffected
Red Hat OpenShift Container Platform 3.11jenkinsOut of support scope
Red Hat OpenShift Container Platform 4jenkinsAffected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-378
https://bugzilla.redhat.com/show_bug.cgi?id=2240095jenkins: Stapler web framework temporary uploaded file created with insecure permissions

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
около 2 лет назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file uploads using the Stapler web framework creates temporary files in the default system temporary directory with the default permissions for newly created files, potentially allowing attackers with access to the Jenkins controller file system to read and write the files before they are used.

CVSS3: 8.1
debian
около 2 лет назад

In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, processing file ...

CVSS3: 3.6
github
около 2 лет назад

Jenkins temporary uploaded file created with insecure permissions

CVSS3: 8.1
fstec
около 2 лет назад

Уязвимость сервера автоматизации Jenkins, связанная с неограниченной загрузкой файла опасного типа, позволяющая нарушителю получить доступ на чтение, изменение или удаление файлов

CVSS3: 8.8
redos
больше 1 года назад

Множественные уязвимости jenkins

3.6 Low

CVSS3